Permanent Identity Access Management Jobs in the Thames Valley

1 to 9 of 9 Permanent Identity Access Management Jobs in the Thames Valley

Cyber Engineer, PAM Cyberark 2 days PW Reading - £50k

Reading, Berkshire, South East, United Kingdom
Circle Group
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Employment Type: Permanent
Salary: £40,000
Posted:

Cyber Security Engineer

Reading, England, United Kingdom
Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create … documentation that enables the business to use the cloud securely Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into the Lead Cyber Security Engineer, you will have plenty of opportunity to learn and test and advance your skills across a range of projects. To be considered you must have a cyber more »
Posted:

Cyber Security Architect

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
This role is responsible for providing subject matter expertise and guidance to Business teams and and Partners that own the day to day management and safeguarding of customer information and protection of physical/logical assets of the company. Experience of working with and influencing various levels of … management, building relationships and influence across teams and a wider community of other leaders and managers. A clear communicator. Ability to lead, make decisions, problem solve and work within teams. Can demonstrate flexibility and agility to move between role types within teams. Will have clear subject matter experience … solve problems and input to operational and strategic plans. Can demonstrate the ability to gather, analyse and present information in business terms for management and leadership consumption. Ability to work in a fast paced changing environment that shows flexibility, resiliency, self-awareness and ability to support other team more »
Posted:

Technical Architect – Digital Identity

Reading, England, United Kingdom
Hybrid / WFH Options
Mastek
Technical Architect – Digital Identity Location: Reading (Hybrid) SC Clearance is essential Description Mastek is delivering a major project in the secure government portfolio that requires an … experienced Technical Architect to complement the existing team. The ideal candidate will be someone with experience of delivering large scale Identity and access management capabilities preferably in secure public sector environments. Experience and skills: · Effective decision making and the ability to understand, solve and … Takes responsible for leading the technical design of systems and services, justify and communicate design decisions · Has experience of the identity and access management domain, including authentication protocols (OAuth, OpenID Connect and SAML) and account lifecycle · Comfortable with Java application stacks, REST API, Linux more »
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … access products LAN & WAN networking using Cisco routers, switches and infrastructure products. Good understanding of TCP/IP Identity and access management systems Active Directory, GPO Configuration Citrix/VMWare Desirable Experience: Experience of managing and developing a SIEM system, and feeding … Understanding of vulnerability management and defence against attacks in order to drive the business in improvement Understanding of Identity and Access Management function and technology in order to drive improvement of the function Please apply via this ad in the first instance more »
Posted:

Network Security Consultant

Reading, England, United Kingdom
MarkJames Search
for project delivery, where you will specialise in network security. Requirements: CCNA/CCNP/CISSP or equivalent. Palo Alto (PCNSA/PCNSE) Identity & Access Management: Cisco ISE, Aruba ClearPass policy manager Knowledge of Cloud deployments such as (Azure/AWS/GCP) Strong more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »
Posted:

ZTA Architect

Reading, England, United Kingdom
Stack Digital
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, Identity and Access Management, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
Posted:

Technology Risk Analyst

Windsor, Berkshire, South East, United Kingdom
British Gas
teams e.g. Data Protection and Privacy, as regards to Technology risks Understand the external security environment and emerging trends to support Technology risk management What we need from you … Strong knowledge of Technology risk and Control assessment methods/Technology Audit Strong knowledge of Information Security technologies, such as identity and access management, encryption, and multi-factor authentication Understanding of power utilities, retail energy, and oil & gas industry trends and emerging threats would … to drive technical consensus and facilitate agreements with challenging stakeholders Ability to understand business visions and strategy Strong communication (oral and written) and conflict management skills Education/Certification: CISA, CRISC or other similar qualification (desirable) Our commitment to diversity We are proud to be recognised as a more »
Employment Type: Permanent
Posted:
Identity Access Management
the Thames Valley
25th Percentile
£56,625
Median
£58,250
75th Percentile
£74,906
90th Percentile
£101,963